Ensure that encryption in transit is enabled for all SQL databases instances provisioned with Alibaba Cloud RDS in order to meet security and compliance requirements. The encryption feature forces all connections to PostgreSQL and MySQL database instances to use SSL. Once enabled, the data transport encryption and decryption is handled transparently and does not require any additional action from you or your application. Encryption in transit is disabled by default.
When working with production and sensitive data, it is strongly recommended to enforce in-transit encryption in order to protect your RDS SQL databases from unauthorized access and fulfill compliance requirements for data encryption in your organization. For example, a compliance requirement is to protect sensitive data that could potentially identify a specific individual such as Personally Identifiable Information (PII), usually used in Financial Services, Healthcare, and Telecommunications sectors.
Audit
To determine if your RDS database instances are configured to enforce SSL for all incoming connections, perform the following operations:
Remediation / Resolution
To enable encryption in transit for your Alibaba Cloud RDS database instances, perform the following operations:
References
- Alibaba Cloud Documentation
- Configure the SSL encryption feature
- Configure the SSL encryption feature
- Use the cloud disk encryption feature
- Alibaba Cloud CLI Documentation
- DescribeDBInstances
- DescribeDBInstanceSSL
- ModifyDBInstanceSSL